Abstract
The coverage problem of finding penetration paths is rooted in the intrusion detection and tracking applications. A penetration path is a crossing path (a continuous curve with arbitrary shape), which enters the sensor field from one side and leaves the sensor field from the other side. For example, given the knowledge of the network deployment, an intruder would like to find a safest penetration path such that when it moves along the path, it is most unlikely to be detected and tracked. From the viewpoint of a defender, a safest penetration path to the intruder is its weakest path. A defender needs to identify such worst penetration paths and takes some measure to improve the network monitoring performance. The objective of finding penetration paths is to identify one crossing path with every point on it whose coverage measure satisfies a predefined coverage requirement. This is different from the problem of building intrusion barriers, which is mainly to guarantee that some points of every crossing path should meet certain coverage requirements. This chapter discusses the coverage problem of finding penetration paths, and the following questions are addressed in this chapter.
What are penetration paths and how to find a penetration path?
The definition and the property of a penetration path are dependent on the coverage model and coverage requirements. This chapter introduces some typical types of penetration path and presents the algorithms for finding penetration paths.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Adriaens, J., Megerian, S., Potkonjak, M.: Optimal worst-case coverage of directional field-of-view sensor networks. In: IEEE 3rd Annual Communications Society on Sensor and Ad Hoc Communications and Networks (SECON), pp. 336–345 (2006)
Chin, T.L., Ramanathan, P., Saluja, K.K., Wang, K.C.: Exposure for collaborative detection using mobile sensor networks. In: IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), pp. 1–8 (2005)
Clouqueur, T., Ramanathan, P., Saluja, K.K.: Exposure of variable speed targets through a sensor field. In: IEEE International Conference on Information Fusion (IF), pp. 599–605 (2003)
Clouqueur, T., Phipatanasuphorn, V., Ramanathan, P., Saluja, K.K.: Sensor deployment strategy for detection of targets traversing a region. Mobile Networks and Applications 8(4), 453–461 (2003)
Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd Edition. MIT Press, Cambridge (2001)
Deng, K., Liu, Z.: Minimum path exposure and detection interval setting for target detection using wireless sensor network. International Journal of Wireless Information Networks (Springer) 14(4), 289–294 (2007)
Duttagupta, A., Bishnu, A., Sengupta, I.: Optimization problems based on the maximal breach path measure for wireless sensor network coverage. In: The 3rd International Conference on Distributed Computing and Internet Technology (ICDCIT), also in LNCS, vol. 4317, pp. 27–40 (2006)
Duttagupta, A., Bishnu, A., Sengupta, I.: Maximal breach in wireless sensor networks: Geometric characterization and algorithms. In: The 3rd International Workshop on Algorithmic Aspects of Wireless Sensor Networks (Algosensors), also in LNCS, vol. 4837, pp. 126–137 (2008)
Fang, C., Low, C.P.: Redundant coverage in wireless sensor networks. In: IEEE International Conference on Communications, pp. 3535–3540 (2007)
Hall, P.: Introduction to the Theory of Coverage Processes. Wiley, New York (1988)
Harada, J., Shioda, S., Saito, H.: Path coverage properties of randomly deployed sensors with finite data-transmission ranges. Computer Networks (Elsevier) 53(7), 1014–1026 (2009)
Hou, Y.T., Chen, C.M., Jeng, B.: An optimal new-node placement to enhance the coverage of wireless sensor networks. Wireless Networks (Springer) (2009). doi:10.1007/s11276-009-0186-x
Huang, H., Richa, A.W., Segal, M.: Dynamic coverage in ad-hoc sensor networks. Mobile Networks and Applications 10, 9–18 (2005)
Huang, L.S., Xu, H.L., Wang, Y., Wu, J.M., Li, H.: Coverage and exposure paths in wireless sensor networks. Journal of Computer Science and Technology 21(4), 490–495 (2006)
Li, X.Y., Wan, P.J., Frieder, O.: Coverage in wireless ad hoc sensor networks. IEEE Transactions on Computers 52(6), 753–763 (2003)
Manohar, P., Ram, S.S., Manjunath, D.: Path coverage by a sensor field: The nonhomogeneous case. ACM Transactions on Sensor Network (ToSN) 5(2), 1–26 (2009)
Megerian, S., Koushanfar, F.: Exposure in wireless sensor networks: Theory and practical solutions. Wireless Networks 8, 443–454 (2002)
Megerian, S., Koushanfar, F., Potkonjak, M., Srivastava, M.B.: Worst and best-case coverage in sensor networks. IEEE Transactions on Mobile Computing 4(1), 84–92 (2005)
Meguerdichian, S., Koushanfar, F., Potkonjak, M., Srivastava, M.B.: Coverage problems in wireless ad-hoc sensor networks. In: IEEE Infocom, vol. 3, pp. 1380–1387 (2001)
Meguerdichian, S., Koushanfar, F., Qu, G., Potkonjak, M.: Exposure in wireless ad hoc sensor networks. In: ACM International Conference on Mobile Computing and Networking (MobiCom), pp. 139–150 (2001)
Mehta, D.P., Lopez, M.A., Lin, L.: Optimal coverage paths in ad-hoc sensor networks. In: IEEE International Conference on Communications (ICC), pp. 507–511 (2003)
Onur, E., Ersoy, C., Delic, H.: Finding sensing coverage and breach paths in surveillance wireless sensor networks. In: IEEE Internal Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), pp. 984–988 (2004)
Onur, E., Ersoy, C., Delic, H.: How many sensors for an acceptable breach detection probability? Computer Communications (Elsevier) 29(2), 173–182 (2006)
Ram, S.S., Manjunath, D., Iyer, S.K., Yogeshwaran, D.: On the path coverage properties of random sensor networks. IEEE Transactions on Mobile Computing 6(5), 446–458 (2007)
Veltri, G., Huang, Q., Qu, G., Potkonjak, M.: Minimal and maximal exposure path algorithms for wireless embedded sensor networks. In: ACM International Conference on Embedded Networked Sensor Systems (SenSys), pp. 40–50 (2003)
Wang, B., Chua, K.C., Wang, W., Srinivasan, V.: Worst and best information exposure paths in wireless sensor networks. In: International Conference on Mobile Ad-hoc and Sensor Networks (MSN05), also in LNCS, vol. 3794, pp. 52–62 (2005)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2010 Springer-Verlag London
About this chapter
Cite this chapter
Wang, B. (2010). Find Penetration Paths. In: Coverage Control in Sensor Networks. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-84996-059-5_10
Download citation
DOI: https://doi.org/10.1007/978-1-84996-059-5_10
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-84996-058-8
Online ISBN: 978-1-84996-059-5
eBook Packages: Computer ScienceComputer Science (R0)